[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Xen Security Advisory 329 v3 (CVE-2020-15852) - Linux ioperm bitmap context switching issues


  • To: Christoph <mangel@xxxxxx>, Xen.org security team <security@xxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Tue, 21 Jul 2020 12:40:55 +0100
  • Authentication-results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
  • Cc: xen-users@xxxxxxxxxxxxx
  • Delivery-date: Tue, 21 Jul 2020 11:41:27 +0000
  • Ironport-sdr: IgCFT3qqRQ9IBUNIfOIygtczWp3be1Lsz66qNQlOq/OKRN5W6ArUJmK7qeNCQiyLxzL1IODR8c BZYy562cub8+emt9S+kkF0KIPqtC+JNMwHBBnq7dKPDVgAh1odaj94Fb0JaOg5ybpJqjKsn8Be Py1br9KsPLt+usWjFdteu3+gmxk5ZBO/lukrCbhqTH4t6xJE7kY3Vmo77jka9If8bn7VeNYTdW 5JGCQNhMXJmBjPLR9t1MrwZ8fsiNafDZX2VfmAu3pqacDMD1qotEvlf8nP7nrZtEEim1+rIL20 xHI=
  • List-id: Xen user discussion <xen-users.lists.xenproject.org>

On 21/07/2020 12:33, Christoph wrote:
> Hi,
>
> if I build the next xen version, for example xen 4.14-rc7 (when its
> available). Does it ever include such a patch?

Hello,

This is a fix to Linux, not a fix to Xen.

It is fixed upstream in Linux just in time for the 5.8 release, and
should be making its way back into the stable trees in due course.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.